3.2 The Missions and Some Implications to Privacy Rights -- 3.2.1 The Police, Law Enforcement Agencies, and National Security Service -- 3.2.2 Reasonable Ground to Open a Criminal (Cyber) Investigation -- 3.2.3 The Legal Framework(s) -- 3.2.4 General Conditions for Privacy-Invasive Cyber Investigation Methods -- 3.2.5 The Private Sector Cyber Investigator -- 3.3 The Different Mandates of the LEA, NIS, and the Police -- 3.3.1 Law Enforcing Agencies and the Police -- 3.3.2 The National Intelligence Service (NIS) -- 3.4 Jurisdiction and International Cooperation -- 3.4.1 The eNIS and the Principle of Sovereignty -- 3.4.2 The iNIS and the LEA - International Cooperation -- 3.5 Human Rights in the Context of Cyber Investigations -- 3.5.1 The Right to Fair Trial -- 3.5.2 Covert Cyber Investigation -- 3.5.3 Technical Investigation Methods (Technical Hacking) -- 3.5.4 Methods Based on Social Skills (Social Hacking) -- 3.5.5 Open-Source Intelligence/Investigation -- 3.6 The Private Cyber Investigator -- 3.6.1 Cyber Reconnaissance Targeting a Third Party -- 3.6.2 Data Protection and Privacy Rights -- 3.7 The Way Ahead -- 3.8 Summary -- 3.9 Exercises -- Chapter 4 Perspectives of Internet and Cryptocurrency Investigations -- 4.1 Introduction -- 4.2 Case Examples -- 4.2.1 The Proxy Seller -- 4.2.2 The Scammer -- 4.2.3 The Disgruntled Employee -- 4.3 Networking Essentials -- 4.4 Networks and Applications -- 4.4.1 Operational Security -- 4.4.2 Open Sources -- 4.4.3 Closed Sources -- 4.4.4 Networks -- 4.4.5 Peer-to-Peer -- 4.4.6 Applications -- 4.5 Open-Source Intelligence (OSINT) -- 4.5.1 Methodology -- 4.5.2 Types of Open-Source Data -- 4.5.3 Techniques for Gathering Open-Source Data -- 4.6 Internet Browsers -- 4.6.1 HTTP, HTML, JavaScript, and Cache -- 4.6.2 Uniform Resource Locators (URLs) -- 4.6.3 Cookies and Local Storage -- 4.6.4 Developer Tools. |